Friday, December 31, 2010

How to do an Prank Call

In This post i going 2 show how to do an prank call .In this method u can call of no cost in  any country  up to ten min
http://www.mobivox.com/ just go 2 this web site and sin up then go 2 direct web call enter u r number and  victims number then choose the call button first call come 2 u r number  then it automatically connect the number which u enter
           enjoy this cool tricks

Download Deep Freeze 6 Full version: Protect computers from Viruses

Sometimes, we download and install a software on computer and on installation, we find our computer losing its sound state. Even, sometimes, we want to safely test a Keylogger or any suspicious file on our computer. So, at such situations, it is better to use Deep Freeze 6 software which really helps you to protect your computer from such Viruses and keyloggers. Deep Freeze 6 is one of the best security softwares ever made. So, download deep freeze 6 full version to protect your computer from viruses and hacking tools. I have provided link for Deep Freeze 6 full version software download... just read on.

Download Deep Freeze 6 Full version

Deep Freeze 6 to protect from viruses:


Deep Freeze 6 comes with unique "Boot Frozen" feature which makes it really very special. When you start your computer in "Boot Frozen" mode, all the changes made to your computer in current session will be erased when you restart your computer. So, whenever you have to test any keylogger or RAT server on yourself, enable "Boot Frozen" mode and test your server. After you have finished your work, simply restart your system and it will be restored to the previous state... the changes made by server or virus in this session will be erased, thus keeping your computer safe and sound.

Download Deep Freeze 6 Full version:


1. Free Download Deep Freeze 6 Full version to protect your computer from viruses.
Password: techotoys.blogspot.com

2. Unzip the file and run Deep Freeze.exe file on your computer. Your computer will be restarted.

3. On restart, you will see Deep Freeze taskbar icon icon in your taskbar. Keeping shift pressed, double click on this icon to access the Deep Freeze 6 control panel. You can even assign password to Deep Freeze 6.

4. Deep Freeze can be operated in two modes:

Boot Frozen: When selected, Deep Freeze will nullify all the changes made to your computer on restart.

Boot Thawed: When selected, Deep Freeze will not nullify any changes on restart.

Remember to use "Boot Frozen" mode while testing any RAT or suspicious file on your computer.

So friends, this was a little tutorial on how to download Deep Freeze 6 full version and the way to use it. I have provided many hacking softwares on Techotoys. Always use Deep Freeze in "Frozen" mode while testing these hacking softwares, to prevent any harm to your computer. If you have any problem to download Deep Freeze 6 full version to protect your computer from viruses, please mention it in comments.

Enjoy n download Deep Freeze 6 Full version...

Thursday, December 30, 2010

Hack E-Mail Passwords using Remote Password Hacking Tool

tDev1l keylogger is used to steal all stored passwords on victim computer. When victim opens our sent keylogger on his computer, it searches for all saved passwords on his computer and then simply sends those saved passwords along with user ids to you via email.


How to use tDev1l keylogger?


1. First of all download tDev1l keylogger from here.

You need a registration key to unlock it. Use one of these: tdev1l-its-0k-2-cry or devil-its-0k-2-cry

2. Run "tDevil.exe" file to get something like this:
tdevil1


3. Now simply type in your Gmail email adress and password (You can create a gmail account only for keyloggers, like this one), in "Send Logs Every Minute" choose like 30, so every 30 minutes u will get a email with the key logs. Now press "Build" and send the built app to victim. When they open nothing happens, but there keylogged and every 30 min u will get email with there key logs in.

4. To remove the Keylogger from your pc open taskmanager and kill the process "server.exe".

Now all you have to do is spread the server around and infect people with it and soon you will have lots of email in your gmail account with there Keystrokes.

5. This password stealer server is detected as virus during runtime. But, its 100% FUD (Fully Undetectable) during scantime. So, you can use Crypter / Binder to get rid of antivirus detection.

How to view blocked sites





You generally are not able to view a site because the access control list is configured in a firewall to block any attempts to site and pop-up an error message

The simplest way to overcome is to redirect the traffic - there are more than 1000 proxy servers on the net and they keep increasing everyday (so, no access control list can block all of them - if one is blocked search for other in google )

TRY THESE :
www.breakthefirewall.com
www.zend2.com
www.anonymizer.com
www.vtunnel.com
http://www.myipproxylist.com/

They not only allow you to view any site by redirecting the traffic but also help you to carry out hacking .Consider an attack case

UR machine >>> Proxy 1 >>> Proxy 2>>> Proxy3... Proxy n >>> Target Machine

Now the target machine will have ip of last proxy u connected to. SO it will be impossible for them to trace you if u hack them... particularly if all the proxies belong to different countries...

ADDS :
Kindle Wireless Reading Device, Wi-Fi, Graphite, 6" Display with New E Ink Pearl Technology3 Pack of Premium Crystal Clear Screen Protectors for Apple iPad3 Pack of Universal Touch Screen Stylus Pen (Red + Black + Silver)

Wednesday, December 29, 2010

How to hack Facebook [Highly detailed Tutorial] - Updated methods

Labels:


 Hello, everyone.
First of all Merry Christmas to all the readers,
Today, I will write yet another tutorial on how to hack Facebook
and dealing with a lot of problems along the way. This tutorial will be highly detailed with everything, including what you will need and all the thinking process necessary to successfully hack a Facebook account.


I will be covering:
1) Key loggers
2) Rats
3) Phishing (Well, not really.)
4) Social Engineering
5) How not to get traced




Let's begin.

I have seen that 99.9% of the tutorials on HF as of now recommend Phishing, keylogging, RATing, and even Social Engineering (SE) as the most notable methods to take over a Facebook account and essentially "hack it"

Before, we go any further. Let me say that Facebook cannot be hacked with a program of any kind. If you see anyone claiming that they have a program to hack Facebook, they are lying.


Now, why are key loggers, phishers, social engineering, and some RATs bad?

-Key loggers only record the keys pressed on the keyboard.

-Phishers essentially do the exact same thing as key loggers, however the slave must do it manually.

-Social Engineering is the trickiest and I would probably say the hardest method of stealing Facebook account nowadays.

-RATs are probably the best road to take if you plan to steal a Facebook account because you have access to Socks5. Socks5 being their own system.


Key logger I recommend: Rapzo Logger v 1.5
               Rapzo Logger v 1.5 ( Public Edition )









              

" Virus Results By Scan4you.net 0/32 "(Paid Host ) 


Options

Stealers [6] All Stealers Pure Code - No Drops + Runtime FUD

[#] Firefox 3.5.0-3.6.X
[#] DynDns
[#] FileZilla
[#] Pidgin
[#] Imvu
[#] No-Ip

Features [25]

* Full UAC Bypass & Faster Execution
* Coded in Vb.NET
* Min Req Is .net 2.0 Now A days every pc Have it
* Cool & user friendly GUI
* Easily Understandble
* Encrypt Information
* Encrypt E-mail information
* 100% FUD from all AV's
* 4 Extentions [ . exe | .scr | .pif | .com ]
* Keylogger support - Smtp[Gmail,Hotmail,live,aol,]
* Test E-mail - is it vaild or not.
* Customize the "To" e-mail address.
* Screen Logger
* Cure.exe to remove server from your Compute
* Usb Spreade
* File pumper - Built-in
* Icon Changer - Preview
* Logs are nice and clear
* Log Letters - ABCD etc.
* Log Symbols - !@#$% etc.
* Log Numbers - 12345 etc.
* Log specific key's - [F4][F5][TAB][HOME][Pg Dn][Pause Break][Prtsc SysRq].. Etc.
* Hidden really good & invisible
* Send new logs over and over again
* ReadMe.txt - How To Use
* Vedio Tutorial - How To Use
Working on all Windows Operating System's - [Winxp\vista\W7] --- [32 + 64 ] Bit Computers





1) Why that key logger? Well, it's Free and it works. I tested it.


How to set it up:
1)(Click here to view)
2)(Click here to view)

After you have done that above, simply build your server. Click Test me to be sure it works. Be sure to select what kind of e-mail you want to use and put the e-mail and the password.

Now, considering that this keylogger is free, you will need to get your file crypted.

Crypting is essentially making your server or bot, or whatever you want to call it, FUD (Full undetected), being not detected by any Anti Virus or at least UD (Undetected), being only being detected by a few Anti virus.

Why crypt? Well, so your file doesn't get detected and immediately deleted as soon as the target opens the file.

2) Let's move on to RATs,


I see the same question all the time, Which is the best/favorite RAT?

-Based on my personal experience, I can say that DarkComet and Cybergate are the best for RATs being free.

You can find DarkComet here: http://darkcomet-rat.com/
You can find CyberGate here: http://website.cybergate-rat.org/mainpage/

I will not go into teaching you how to set those up because there are already a ton of tutorials on how to do that.

I did a quick search to find tuts and these looked good:
Setting up DarkComet
Setup Cybergate
(Will Publish This Soon As I Get The time)

3) Phishing

-I will not go into phishing since it's against the rules. Sleep

4) Social Engineering

-Ah, the classic stories of "My friend hacked my facebook" or "How can I hack my friend?" or my personal favorite "How to hack my girlfriend's Facebook?"

A common mistake by layman who do not know much about the internet is giving information out without actually knowing that they are giving the information out.

Social Engineering on Facebook seems like a joke considering that you aren't going to ask the person their password and e-mail for you to log in. Even if they do in fact give you their information voluntarily, it's pointless.

Why is it pointless? Well, Facebook has become smarter on their security.

I wrote about the reasons in dept on my other tutorial: Why you shouldn't phish, keylog, SE on Facebook.

(Click here to view)

Basically, it comes down to this.

Facebook will detect 'Suspicion' on the account that you are logging in and it will not allow you to log in under that account simply because their logs of the original account owner do not match with your IP or the IP your are hidden behind.

1) Suspicion

2) Security question

3) Confirm Identity

4) Confirm identity by identifying the friends on that account.

Now to retrieve back to the very beginning of this tutorial, I said that Key logging, Phishing, Social Engineering, and RATs were the common methods associated with hacking a Facebook account.

I will respectfully correct my mistake and as well as the other tutorials on here.

1) Even if you do manage to steal the password and e-mail using Keylogs, the problem of suspicion will appear.

2) Even if you do manage to steal the password and e-mail using Phishing, the problem of suspicion will appear.

3) Even if you do manage to crack the password out of your target through Social Engineering, the problem of suspicion will appear.

4) RATs are probably and definitely the best way to go into "hacking" a Facebook account simply because you will have full access to their computers. You can change their info through computers and the problem of suspicion will not appear.


RATs are NOT the only possible way to get in! Keylogging, Phishing, and Social Engineering might work as well.

I believe that Facebook compares the ranges of IP based on the ISP of the target. Now, if that's the case...Simply do a whois on the slave using the RAT.

If you do not know what whois is, it's basically a query that searches where the target is located. Normally you can double click on the slave when they are online on the RAT and see where they are from and look at their IP.

Now, you don't really need a RAT to tell you where the slave lives or his IP. If you already have his IP or location through other methods such as reverting you're good to go.

However, if you do not have any information at all what so ever, you can try searching on these sites to revert info about the target.

http://com.lullar.com/

http://www.pipl.com/email/

http://www.spokeo.com

http://www.emailfinder.com

Now, once you have an IP or ISP, or location the next part is looking for a Sock5 to hide behind so Facebook thinks that you are only using a different computer in the same area. You can also spoof the IP, but I will not go into that.

So, after all that work, you still can't take over their accounts?


I thought about this method as I was showing a friend through Teamviewer the pictures that Facebook was showing me to identify the target's friends. And obviously, I was clueless because I did not know of the people.

What did I do? Well, as you can see the picture #4:

1) Suspicion

2) Security question

3) Confirm Identity

4) Confirm identity by identifying the friends on that account.

Facebook provides the names of the target's friends. So, use that information to essentially bypass the security of identification by searching those names on Facebook search and matching the faces based on the Target's friends.

Note that will need an extra Facebook account to search, otherwise Facebook does not let you search. Close the 'Suspicion' page and log in to your extra or your actual Facebook account and search for the Target's friends.

Be sure to notice where your target lives so on the results you can compare whether if the friend is the matching face or not. Be sure to notice the names of the friends as well.

For example, if the name choices are:
George Bush
Adolf Hitler
Barrack Obama
Mohammed Ali
Lee Chang

And the picture given is of an middle eastern descent looking person, you should obviously go with the name that sounds middle eastern.

Once you match the faces for the identification questions. You should be able to get in without a problem.

To wrap it up,

I will warn you one one important thing, if you do not have access to their e-mails. They will get an e-mail notifying that someone is trying to log in on their accounts and your IP will be shown to them.

So, what that means is to always hide behind a VPN or a proxy so you can't be traced back.

Try to take over their e-mails if you want or simply delete the notification e-mails so they do not notice.

Taking over the e-mail will be an obvious sign that they got hacked and they might try to retrieve the e-mail password, so be sure to change the e-mail password and security questions immediately so they cannot get it back. Only take over the e-mail once you have completely stolen and gained access to the Facebook account because they can easily change the e-mail on the Facebook account and you'll be screwed.

Well, I believe that this is all I have to say. Black 
Hat

I was going to originally sell this as an ebook for $10, but since I am nice I released it for free. As This is Christmas Time. So, I decided to share this information out for free.


## I WILL BE APPRECIATED BY GETTING A SMALL THANKS FROM YOUR SIDE... 


***THIS TUTORIAL IS FOR EDUCATION PURPOSE ONLY DON'T USE IT FOR ANY ILLEGAL PURPOSE..


Truth about Cell Phone Spying via Bluetooth



Lately, many sites have popped up selling an amazing sounding product –bluetooth hacking software! Wouldn’t it be awesome to hack anyone’s mobile phone so that you can read their text messages, address book, dialed numbers, received calls, and even their photos and videos? Many sites are saying you can, and people are paying $5 to $100 for it.
The truth is that not only is this software freely available, but it’s highly misleading on what it can actually do. I’ve taken the liberty to fully investigate and reveal the truth about bluetooth hacking.

What is bluetooth?

If you have no idea what bluetooth is, it’s basically a data transfer technology that is in almost all new phones. You will probably recognize it as the brain behind the wireless headsets in people’s ears. Essentially what bluetooth does is allow two bluetooth capable devices to communicate with each other, and the idea is that this hacking software can reach into any bluetooth phone and freely pull it’s data.

What’s the catch?

While yes this software can actually retrieve data from a bluetooth phone – there is a catch. To connect to any bluetooth phone, the phone not only needs to have bluetooth turned on, but the other phone must accept a pairing request. A pairing request involves 1 phone to enter a passkey, and the other phone must enter the same key. Currently, there is no software that can bypass this, which makes the idea of hacking anyones cellphone a fantasy. On the other hand, there is some use to this software. If you have access to two bluetooth capable phones and how to pair them together, you can set the phones to automatically pair in the future. Then as long as bluetooth is turned on on each phone, you can use software on 1 of the phones to access information on the other phone. The range on bluetooth is around 32 feet or you will not be able to pair the devices.

Get it for free

To install the software, your phone must support Java (most phones do) and you will also need to to be able to download the software file to your phone to install it.
Super Bluetooth Hack v1.8 is available for free below:
Features include:
- changing time/alarms
- read messages
- read contacts
- change profile
- play ringtones even if phone is on silent
- play music/songs
- restart the phone
- switch off the phone
- restore factory settings
- change ringing volume
- And best of all, make calls from the target phone
Minimal requirements :
-MIDP 2.0
-CLDC 1.0
-JSR-82 Bluetooth
Languages in 1.08(Supplier)
-Slovenčina
-Čeština
-English
-German
-Russian
-Greek

Tuesday, December 28, 2010

How to boost the speed for your PC


Friends.,
below is a suggestion which it help you to speed up your PC.,
Just do the below steps carefully

> Right click on My Computer
>Properties
>Advanced
>Performnce
>Advanced
>Virtual Memory-Change
Keep Initial Size
Same & Max Size Double

Try this Guyz

If your any other suggestions kindly comment here

Pdf Tricks

Convert ur pdf file online without any software.
try
www.zamzar.com
it convert ur pdf online in many
file format like html, txt, rtf etc.

Windows tricks

HIGHJACK
>Want to play directly ur
media player?
Try this trick:-
go to
>run
>type wmplayer
>ok.
U can now view

How to Hack Email Account Passwords Using ProRat?




1. First of all Download ProRat. Once it is downloaded right click on the folder and choose to extract it. A password prompt will come up. The password will be "pro".

2. Open up the program. You should see the following:
email


3. Next we will create the ProRat Trojan server. Click on the "Create" button in the bottom. Choose "Create ProRat Server".

prorat2
 
4. Next put in your IP address so the server could connect to you. If you don’t know your IP address click on the little arrow to have it filled in for you automatically. Next put in your e-mail so that when and if a victim gets infected it will send you a message. We will not be using the rest of the options.

prorat3

5. Now Open General settings. This tab is the most important tab. In the check boxes, we will choose the server port the program will connect through, the password you will be asked to enter when the victim is infected and you wish to connect with them, and the victim name. As you can see ProRat has the ability to disable the windows firewall and hide itself from being displayed in the task manager.

Here is a quick overview of what they mean and which should be checked:

prorat4

6. Click on the Bind with File button to continue. Here you will have the option to bind the trojan server file with another file. Remember a trojan can only be executed if a human runs it. So by binding it with a legitimate file like a text document or a game, the chances of someone clicking it go up. Check the bind option and select a file to bind it to. A good suggestion is a picture or an ordinary text document because that is a small file and its easier to send to the people you need.
prorat5

7. Click on the Server Extensions button to continue. Here you choose what kind of server file to generate. I prefer using .exe files, because it is cryptable and has icon support, but exe’s looks suspicious so it would be smart to change it.
prorat7

8. Click on Server Icon to continue. Here you will choose an icon for your server file to have. The icons help mask what the file actually is. For my example I will choose the regular text document icon since my file is a text document.
prorat8

9. After this, press Create server, your server will be in the same folder as ProRat. A new file with name "binded_server" will be created. Rename this file to something describing the picture. A hacker could also put it up as a torrent pretending it is something else, like the latest game that just came out so he could get people to download it.

Very important: Do not open the "binded_server" file on your system.

10. You can send this trojan server via email, pendrive or if you have physical access to the system, go and run the file. You can not send this file via email as "server.exe", because it will be detected as trojan or virus. Password protect this file with ZIP and then email it. Once your victim download this ZIP file, ask him to unlock it using ZIP password. When the victim will double click on the file, he will be in your control.

11. Now, I will show you what happens when a victim installs the server onto his computer and what the hacker could do next.
prorat9

Once the victim runs the server on his computer, the trojan will be installed onto his computer in the background. The hacker would then get a message telling him that the victim was infected. He would then connect to his computer by typing in his IP address, port and clicking Connect. He will be asked for the password that he made when he created the server. Once he types it in, he will be connected to the victims computer and have full control over it.

12. Now the hacker has a lot of options to choose from as you can see on the right. He has access to all victim's computer files, he can shut down his pc, get all the saved passwords off his computer, send a message to his computer, format his whole hard drive, take a screen shot of his computer, and so much more. Below I’ll show you a few examples.
prorat10

13. The image below shows the message that the victim would get on his screen if the hacker chose to message him.

prorat11

14. Below is an image of the victims task bar after the hacker clicks on Hide Start Button.
prorat12

15. Below is an image of what the hacker would see if he chose to take a screen shot of the victims screen.

prorat13

As you saw in the above example, a hacker can do a lot of silly things or a lot of damage to the victim. ProRat is a very well known trojan so if the victim has an anti-virus program installed he most likely won’t get infected.

Monday, December 27, 2010

How to Find Who is Invisible or blocked you on Google chat/Gtalk


Hello friends, welcome back after the article "how to hack the hackers" today i am going to share with you another mind boggling tutorial that is "How to find who  is invisible or blocked you on Google chat/Gtalk". So guys are you ready to know that which of your friend has blocked you on google talk. Whenever you noticed a contact...
Read more "How to Find Who is Invisible or blocked you on Google chat/Gtalk"


Read more: http://www.isoftdl.com/#ixzz19KRUPpl9

IP Spoofing



Learn how to create custom IP packets Using tool RafaleX and Engage Packet Builder
[Image: 
1.JPG]




























The RafaleX application allows for the creation of custom IP packets. The packet is very customizable and allows for the spoofing of the IP, setting the flags, number of packets, and so forth. RafaleX is becoming hard to locate on the Internet as it appears it is now called Engage Packet Builder.

The RafaleX application is an excellent way to “spoof” custom packets. Attackers can place a valid IP address as the source of the packet and the target will have to attempt to respond to the spoofed address. By sending hundreds of thousands of packets in this manner, an attacker can create a Denial of Service attack against a target.

In this example, the Source IP of the packets to be sent is set to 10.10.10.10 with the source address of port 123. According to Internet etiquette, this should never be able to route on the Internet as the 10.x.x.x range is reserved for Private addressing. Set the destination IP to the target address. In this example it is 172.16.1.40. Set the Destination
port to port 21. The SYN and ACK flags were set for each packet.

*Note: The Ethernet communications process requires a three-way handshake:

SYN: Synchronize
SYN-ACK: Synchronize-Acknowledge
ACK: Acknowledge

When a computer receives an uninitiated SYN-ACK packet its response is to send a RST (Reset) packet.
[Image: 2.JPG]

The number of packets was set to 100. Click the Send button to send the packets to the target. The Status area at the bottom left of the application will tell you that the packets were sent.

[Image: 3.JPG]

The proof is below screen shot captured from packet capturing tool:
[Image: 4.JPG]
[Image: 5.JPG]
(frm hackguide4u.tk)

TOP HACKING TOOLS

1. Nmap
I think everyone has heard of this one, recently evolved into the 4.x series.
Nmap (“Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. Nmap runs on most types of computers and both console and graphical versions are available. Nmap is free and open source.
Can be used by beginners (-sT) or by pros alike (–packet_trace). A very versatile tool, once you fully understand the results.
2. Nessus Remote Security Scanner
Recently went closed source, but is still essentially free. Works with a client-server framework.
Nessus is the world’s most popular vulnerability scanner used in over 75,000 organizations world-wide. Many of the world’s largest organizations are realizing significant cost savings by using Nessus to audit business-critical enterprise devices and applications.
3. John the Ripper
John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix flavors, supported out of the box are Kerberos AFS and Windows NT/2000/XP/2003 LM hashes, plus several more with contributed patches.
4. Nikto
Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 3200 potentially dangerous files/CGIs, versions on over 625 servers, and version specific problems on over 230 servers. Scan items and plugins are frequently updated and can be automatically updated (if desired).
Nikto is a good CGI scanner, there are some other tools that go well with Nikto (focus on http fingerprinting or Google hacking/info gathering etc, another article for just those).
5. SuperScan
Powerful TCP port scanner, pinger, resolver. SuperScan 4 is an update of the highly popular Windows port scanning tool, SuperScan.
If you need an alternative for nmap on Windows with a decent interface, I suggest you check this out, it’s pretty nice.
6. p0f
P0f v2 is a versatile passive OS fingerprinting tool. P0f can identify the operating system on:
– machines that connect to your box (SYN mode),
– machines you connect to (SYN+ACK mode),
– machine you cannot connect to (RST+ mode),
– machines whose communications you can observe.
Basically it can fingerprint anything, just by listening, it doesn’t make ANY active connections to the target machine.
7. Wireshark (Formely Ethereal)
Wireshark is a GTK+-based network protocol analyzer, or sniffer, that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and to give Wireshark features that are missing from closed-source sniffers.
Works great on both Linux and Windows (with a GUI), easy to use and can reconstruct TCP/IP Streams! Will do a tutorial on Wireshark later.
8. Yersinia
Yersinia is a network tool designed to take advantage of some weakeness in different Layer 2 protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems. Currently, the following network protocols are implemented: Spanning Tree Protocol (STP), Cisco Discovery Protocol (CDP), Dynamic Trunking Protocol (DTP), Dynamic Host Configuration Protocol (DHCP), Hot Standby Router Protocol (HSRP), IEEE 802.1q, Inter-Switch Link Protocol (ISL), VLAN Trunking Protocol (VTP).
The best Layer 2 kit there is.
9. Eraser
Eraser is an advanced security tool (for Windows), which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Works with Windows 95, 98, ME, NT, 2000, XP and DOS. Eraser is Free software and its source code is released under GNU General Public License.
An excellent tool for keeping your data really safe, if you’ve deleted it..make sure it’s really gone, you don’t want it hanging around to bite you in the ass.
10. PuTTY
PuTTY is a free implementation of Telnet and SSH for Win32 and Unix platforms, along with an xterm terminal emulator. A must have for any h4x0r wanting to telnet or SSH from Windows without having to use the crappy default MS command line clients.
11. LCP
Main purpose of LCP program is user account passwords auditing and recovery in Windows NT/2000/XP/2003. Accounts information import, Passwords recovery, Brute force session distribution, Hashes computing.
A good free alternative to L0phtcrack.
LCP was briefly mentioned in our well read Rainbow Tables and RainbowCrack article.
12. Cain and Abel
My personal favourite for password cracking of any kind.
Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort.
13. Kismet
Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. Kismet will work with any wireless card which supports raw monitoring (rfmon) mode, and can sniff 802.11b, 802.11a, and 802.11g traffic.
A good wireless tool as long as your card supports rfmon (look for an orinocco gold).
14. NetStumbler
Yes a decent wireless tool for Windows! Sadly not as powerful as it’s Linux counterparts, but it’s easy to use and has a nice interface, good for the basics of war-driving.
NetStumbler is a tool for Windows that allows you to detect Wireless Local Area Networks (WLANs) using 802.11b, 802.11a and 802.11g. It has many uses:
  • Verify that your network is set up the way you intended.
  • Find locations with poor coverage in your WLAN.
  • Detect other networks that may be causing interference on your network.
  • Detect unauthorized “rogue” access points in your workplace.
  • Help aim directional antennas for long-haul WLAN links.
  • Use it recreationally for WarDriving.
15. hping
To finish off, something a little more advanced if you want to test your TCP/IP packet monkey skills.
hping is a command-line oriented TCP/IP packet assembler/analyzer. The interface is inspired to the ping unix command, but hping isn’t only able to send ICMP echo requests. It supports TCP, UDP, ICMP and RAW-IP protocols, has a traceroute mode, the ability to send files between a covered channel, and many other features.

SOME HACKING TRICKS

BASIC OF HACKING


                                   The title above, and some of the text looks a little screwed up when read in anything else, so read it in Word Pad.
                                    Anyway, for those of you who are wondering "what do the letters
"LOA" under his handle stand for?"  Well, LOA stands for Legion Of the
Apocalypse, which is a group of elite hackers and phreakers in my area. 
The current members of LOA are:

Revelation, Phreaked Out, Hack Attack, Electric Jaguar, and
Phreak Show

            I started LOA when I discovered that there were many good
hackers and phreakers in my area.  I thought that an organized group of
hackers and phreakers would accomplish much more than an individual
could by himself.  Thus the Legion Of the Apocalypse was formed and has
been around for a while since.  Our  main goal is to show the public
what hacking and phreaking is all about and to reveal confidential
information to the hacking/phreaking community so that we can learn
more about computers, telephones, electronics, etc. We are hoping to
get our own World Wide Web page soon, so keep an eye out for it.  It
will contain all of the hacking, phreaking, computer, telephone,
security, electronics, virus, and carding information that you could
possibly want.
            Also, if some of you are wondering why I chose the word
Revelation as my handle, well, Revelation means revealing or
unveiling, which is exactly what I intend to do as a hacker/phreaker.
 I intend to reveal all the information that I can gather while
hacking and phreaking.
            Anyway, I wrote this document because I have read all the files
that I could get my hands on and noticed that there has never been a
really good file written that guided beginning hackers and phreakers
step by step.
            When I began hacking and started reading all of the beginner
files, I still had many un-answered questions.  My questions were
eventually answered, but only through LOTS of reading and practice. 
In this file, I hope to give basic step by step instructions that will
help beginning hackers and phreakers get started.  But, DO NOT think
that this will save you from having to read alot.  If you want to be a
hacker/phreaker, reading is the most important thing you can do.  You
will have to do ALOT of reading no matter what.
            This document was intended for beginners, but it can also be used
as a reference tool for advanced hackers and phreakers.
            Please distribute this document freely.  Give it to anyone that
you know who is interested in hacking and/or phreaking.  Post it on your
World Wide Web page, Ftp sites, and BBS's.  Do whatever you want with it
as long as it stays UNCHANGED.
            As far as I know, this is the most complete and in depth beginners
guide available, that is why I wrote it.  Also, I plan to have new
volumes come out whenever there has been a significant change in the
material provided, so keep an eye out for them.  LOA is planning on
starting an on-line magazine, so look for that too. And we are also starting a hacking business. Owners of businesses can hire us to hack into their systems to find the security faults. The name of this company is A.S.H. (American Security Hackers), and it is run by LOA. If you have any questions about this company, or would like to hire us, or just want security advice, please E-Mail A.S.H. at "an641839@anon.penet.fi".  
            This document is divided into three main sections with many
different sub-sections in them.  The Table Of Contents is below:


Table Of Contents:


I. HACKING
                       
                        A. What is hacking?
                        B. Why hack?
                        C. Hacking rules
                        D. Getting started
                        E. Where and how to start hacking
                        F. Telenet commands
                        G. Telenet dialups
                        H. Telenet DNIC's
                        I. Telenet NUA's
                        J. Basic UNIX hacking
                        K. Basic VAX/VMS hacking
                        L. Basic PRIME hacking
                        M. Password list
                        N. Connecting modems to different phone lines
                        O. Viruses, Trojans, and Worms

II. PHREAKING

                        A. What is phreaking?
                        B. Why phreak?
                        C. Phreaking rules
                        D. Where and how to start phreaking
                        E. Boxes and what they do
                        F. Red Box plans
                        G. Free calling from COCOT's
                        H. ANAC numbers

III. REFERENCE

                        A. Hacking and phreaking W.W.W. pages
                        B. Good hacking and phreaking text files
                        C. Hacking and phreaking Newsgroups
                        D. Rainbow Books
                        E. Hacking and phreaking magazines
                        F. Hacking and phreaking movies
                        G. Hacking and phreaking Gopher sites
                        H. Hacking and phreaking Ftp sites
                        I. Hacking and phreaking BBS's
                        J. Cool hackers and phreakers
                        K. Hacker's Manifesto
                        L. Happy hacking!


* DISCLAIMER *

            "Use this information at your own risk. I Revelation, nor any
other member of LOA, nor the persons providing this file, will NOT
assume ANY responsibility for the use, misuse, or abuse, of the
information provided herein. The following information is provided for
educational purposes ONLY. The informaion is NOT to be used for illegal
purposes. By reading this file you ARE AGREEING to the following terms:
I understand that using this information is illegal. I agree to, and
understand, that I am responsible for my own actions. If I get into
trouble using this information for the wrong reasons, I promise not
to place the blame on Revelation, LOA, or anyone that provided this
file. I understand that this information is for educational purposes only. This file may be used to check your security systems and if you would like a thorough check contact A.S.H.
            This file is basically a compilation of known hacking and
phreaking information and some information gathered from my own
experience as a hacker/phreaker. I have tried to make sure that
everything excerpted from other documents was put in quotes and labeled
with the documents name, and if known, who wrote it. I am sorry if any
mistakes were made with quoted information."

                                                            *-Revelation-*
                                                                 LOA


I. HACKING


A. What is hacking?


            Hacking is the act of penetrating computer systems to gain
knowledge about the system and how it works.
            Hacking is illegal because we demand free access to ALL data, and
we get it. This pisses people off and we are outcasted from society, and
in order to stay out of prison, we must keep our status of being a
hacker/phreaker a secret.  We can't discuss our findings with anyone but
other members of the hacking/phreaking community for fear of being
punished.  We are punished for wanting to learn. Why is the government
spending huge amounts of time and money to arrest hackers when there are
other much more dangerous people out there. It is the murderers,
rapists, terrorists, kidnappers, and burglers who should be punished for what they have done, not hackers.  We do NOT pose a threat to anyone. We are NOT out to hurt people or there computers. I admit that there are some people out there who call themselves hackers and who deliberately damage computers. But these people are criminals, NOT hackers. I don't care what the government says, we are NOT criminals. We are NOT trying to alter or damage any system. This is widely misunderstood. Maybe one day people will believe us when we say that all we want is to learn.
            There are only two ways to get rid of hackers and phreakers.
One is to get rid of computers and telephones, in which case we would
find other means of getting what we want.(Like that is really going to
happen.) The other way is to give us what we want, which is free access
to ALL information. Until one of those two things happen, we are not
going anywhere.


B. Why hack?
           

            As said above, we hack to gain knowledge about systems and the
way they work. We do NOT want to damage systems in any way. If you do
damage a system, you WILL get caught. But, if you don't damage
anything, it is very unlikely that you will be noticed, let alone be
tracked down and arrested, which costs a considerable amount of time
and money.
            Beginners should read all the files that they can get their
hands on about anything even remotely related to hacking and phreaking,
BEFORE they start hacking. I know it sounds stupid and boring but it
will definetly pay off in the future. The more you read about hacking
and phreaking, the more unlikely it is that you will get caught. Some
of the most useless pieces of information that you read could turn out
to be the most helpful. That is why you need to read everything
possible.


C. Hacking rules


1.         Never damage any system. This will only get you into trouble.

2.         Never alter any of the systems files, except for those needed to
insure that you are not detected, and those to insure that you have
access into that computer in the future.

3.         Do not share any information about your hacking projects with
anyone but those you'd trust with your life.

4.         When posting on BBS's (Bulletin Board Systems) be as vague as
possible when describing your current hacking projects.  BBS's CAN
be monitered by law enforcement.

5.         Never use anyone's real name or real phone number when posting
on a BBS.

6.         Never leave your handle on any systems that you hack in to.

7.         DO NOT hack government computers.

8.         Never speak about hacking projects over your home telephone line.

9.         Be paranoid. Keep all of your hacking materials in a safe place.

10.       To become a real hacker, you have to hack. You can't just sit
around reading text files and hanging out on BBS's. This is not what
hacking is all about.


D. Getting started


            The very first thing you need to do is get a copy of PKZIP
or some other file unzipping utility.  Nearly everything that you
download from the Internet or from a BBS will be zipped. A zipped file is a file that has been compressed. Zipped files end with the extension ".zip".
            Then you need to get yourself a good prefix scanner.(also known
as a War Dialer)  This is a program that automatically dials phone
numbers beginning with the three numbers (prefix) that you specify. It
checks to see if the number dialed has a carrier.(series of beeps that
tells you that you have dialed a computer)  Try and find a large
business area prefix to scan. It is these businesses that have
interesting computers.  There are many good scanners out there, but I
would recommend Autoscan or A-Dial. These are very easy to use and get
the job done quickly and efficiently.


E. Where and how to start hacking


            After you get yourself a good scanner, scan some prefixes and
find some cool dialups, then do the following:  From your terminal,
dial the number you found.  Then you should hear a series of beeps
(carrier) which tells you that you are connecting to a remote computer.
It should then say something like "CONNECT 9600" and then identify the
system that you are on. If nothing happens after it says "CONNECT 9600"
try hitting enter a few times. If you get a bunch of garbage adjust your
parity, data bits, stop bits, baud rate, etc., until it becomes clear.
            That is one way of connecting to a remote computer. Another way is
through Telenet or some other large network.
            Telenet is a very large network that has many other networks and
remote computers connected to it.
            Ok, here is how you would connect to a remote computer through
Telenet:
            First, you get your local dialup(phone number) from the list that
I have provided in Section G.  Then you dial the number from your
terminal and connect.(If you get a bunch of garbage try changing your
parity to odd and your data bits to 7, this should clear it up.)  If
it just sits there hit enter and wait a few seconds, then hit enter
again. Then it will say "TERMINAL=" and you type in your terminal
emulation. If you don't know what it is just hit enter. Then it will
give you a prompt that looks like "@". From there you type "c" and then
the NUA (Network User Address) that you want to connect to. After you
connect to the NUA, the first thing you need to do is find out what type
of system you are on.(i.e. UNIX, VAX/VMS, PRIME, etc.)
            There are other things that you can do on Telenet besides
connecting to an NUA. Some of these commands and functions are listed in
the next section.
            You can only connect to computers which accept reverse charging.
The only way you can connect to computers that don't accept reverse charging is if you have a Telenet account. You can try hacking these. To do this, at the "@" prompt type "access". It will then ask you for your Telenet ID and password.
            Telenet is probably the safest place to start hacking because of
the large numbers of calls that they get. Make sure you call during
business hours (late morning or early afternoon) so there are many
other people on-line.


F. Telenet commands


            Here is a list of some Telenet commands and their functions. This
is only a partial list.  Beginners probably won't use these commands,
but I put them here for reference anyway.

COMMAND                                                  FUNCTION

c                                                                      Connect to a host.
stat                                                                  Shows network port.
full                                                                   Network echo.
half                                                                  Terminal echo.
telemail                                                            Mail.(need ID and password)
mail                                                                 Mail.(need ID and password)
set                                                                    Select PAD parameters
cont                                                                 Continue.
d                                                                      Disconnect.
hangup                                                            Hangs up.
access                                                  Telenet account.(ID and password)


G. Telenet dialups


            Here is the list of all the Telenet dialups that I know of in
the U.S.A., including the city, state, and area code:

STATE,CITY:                                    AREA CODE:                                    NUMBER:

AL, Anniston              205                                          236-9711
AL, Birmingham                     205                                          328-2310
AL, Decatur                            205                                          355-0206
AL, Dothan                             205                                          793-5034
AL, Florence               205                                          767-7960
AL, Huntsville                        205                                          539-2281
AL, Mobile                             205                                          432-1680
AL, Montgomery                    205                                          269-0090
AL, Tuscaloosa                       205                                          752-1472
AZ, Phoenix                            602                                          254-0244
AZ, Tucson                             602                                          747-0107
AR, Ft.Smith              501                                          782-2852
AR, Little Rock                      501                                          327-4616
CA, Bakersfield                      805                                          327-8146
CA, Chico                               916                                          894-6882
CA, Colton                             714                                          824-9000
CA, Compton                         213                                          516-1007
CA, Concord                          415                                          827-3960
CA, Escondido                       619                                          741-7756
CA, Eureka                             707                                          444-3091
CA, Fresno                              209                                          233-0961
CA, Garden Grove                 714                                          898-9820
CA, Glendale              818                                          507-0909
CA, Hayward                         415                                          881-1382
CA, Los Angeles                    213                                          624-2251
CA, Marina Del Rey   213                                          306-2984
CA, Merced                            209                                          383-2557
CA, Modesto                          209                                          576-2852
CA, Montery                           408                                          646-9092
CA, Norwalk                          213                                          404-2237
CA, Oakland                           415                                          836-4911
CA, Oceanside                        619                                          430-0613
CA, Palo Alto             415                                          856-9995
CA, Pomona                           714                                          626-1284
CA, Sacramento                      916                                          448-6262
CA, Salinas                             408                                          443-4940
CA, San Carlos                       415                                          591-0726
CA, San Diego                        619                                          233-0233
CA, San Francisco                  415                                          956-5777
CA, San Jose               408                                          294-9119
CA, San Pedro                        213                                          548-6141
CA, San Rafael                       415                                          472-5360
CA, San Ramon                      415                                          829-6705
CA, Santa Ana                        714                                          558-7078
CA, Santa Barbara                  805                                          682-5361
CA, Santa Cruz                       408                                          429-6937
CA, Santa Rosa                      707                                          656-6760
CA, Stockton              209                                          957-7610
CA, Thousand Oaks               805                                          495-3588
CA, Vallejo                             415                                          724-4200
CA, Ventura                           805                                          656-6760
CA, Visalia                             209                                          627-1201
CA, West Covina                    818                                          915-5151
CA, Woodland Hills   818                                          887-3160
C0, Colorado              719                                          635-5361
CO, Denver                             303                                          337-6060
CO, Ft. Collins                        303                                          493-9131
CO, Grand Junction    303                                          241-3004
CO, Greeley                            303                                          352-8563
CO, Pueblo                             719                                          542-4053
CT, Bridgeport                        203                                          335-5055
CT, Danbury                           203                                          794-9075
CT, Hartford               203                                          247-9479
CT, Middletown                     203                                          344-8217
CT, New Britain                     203                                          225-7027
CT, New Haven                      203                                          624-5954
CT, New London                    203                                          447-8455
CT, Norwalk                           203                                          866-7404
CT, Stamford              203                                          348-0787
CT, Waterbury                        203                                          753-4512
DE, Dover                               302                                          678-8328
DE, Newark                            302                                          454-7710
DC, Washington                     202                                          429-7896
DC, Washington                     202                                          429-7800
FL, Boca Raton                      407                                          338-3701
FL, Cape Coral                       813                                          275-7924
FL, Cocoa Beach                    407                                          267-0800
FL, Daytona Beach                 904                                          255-2629
FL, Ft. Lauderdale      305                                          764-4505
FL, Gainsville             904                                          338-0220
FL, Jacksonville                      904                                          353-1818
FL, Lakeland              813                                          683-5461
FL, Melbourne                        407                                          242-8247
FL, Miami                               305                                          372-0230
FL, Naples                              813                                          263-3033
FL, Ocala                                904                                          351-3790
FL, Orlando                            407                                          422-4099
FL, Pensacola              904                                          432-1335
FL, Pompano Beach               305                                          941-5445
FL, St. Petersburg       813                                          323-4026
FL, Sarasota                813                                          923-4563
FL, Tallahassee                       904                                          681-1902
FL, Tampa                               813                                          224-9920
FL, West Palm Beach 407                                          833-6691
GA, Albany                            912                                          888-3011
GA, Athens                             404                                          548-5590
GA, Atlanta                            404                                          523-0834
GA, Augusta                           404                                          724-2752
GA, Colombus                        404                                          571-0556
GA, Macon                             912                                          743-8844
GA, Rome                               404                                          234-1428
GA, Savannah             912                                          236-2605
HI, Oahu                                 808                                          528-0200
ID, Boise                                 208                                          343-0611
ID, Idaho Falls                        208                                          529-0406
ID, Lewiston               208                                          743-0099
ID, Pocatella               208                                          232-1764
IL, Aurora                               312                                          896-0620
IL, Bloomington                     309                                          827-7000
IL, Chicago                             312                                          938-0600
IL, Decatur                             217                                          429-0235
IL, Dekalb                               815                                          758-2623
IL, Joliet                                  815                                          726-0070
IL, Peoria                                309                                          637-8570
IL, Rockford               815                                          965-0400
IL, Springfield                        217                                          753-1373
IL, Urbana                              217                                          384-6428
IN, Bloomington                     812                                          332-1344
IN, Evansville             812                                          424-7693
IN, Ft. Wayne             219                                          426-2268
IN, Gary                                  219                                          882-8800
IN, Indianapolis                      317                                          299-0024
IN, Kokomo                            317                                          455-2460
IN, Lafayette              317                                          742-6000
IN, Muncie                              317                                          282-6418
IN, South Bend                      219                                          233-7104
IN, Terre Haute                       812                                          232-5329
IA, Ames                                515                                          233-6300
IA, Cedar Rapids                    319                                          364-0911
IA, Davenport             319                                          324-2445
IA, Des Moines                       515                                          288-4403
IA, Dubuque                           319                                          556-0783
IA, Iowa City             319                                          351-1421
IA, Sioux City                        712                                          255-1545
IA, Waterloo               319                                          232-5441
KS, Lawrence             913                                          843-8124
KS, Manhattan                        913                                          537-0948
KS, Salina                               913                                          825-7900
KS, Topeka                             913                                          233-9880
KS, Wichita                            316                                          262-5669
KY, Bowling Green                502                                          782-7941
KY, Frankfort             502                                          875-4654
KY, Lexington                        606                                          233-0312
KY, Louisville                        502                                          589-5580
KY, Owensboro                      502                                          686-8107
LA, Alexandria                       318                                          445-1053
LA, Baton Rouge                   504                                          343-0753
LA, Lafayette             318                                          233-0002
LA, Lake Charles                    318                                          436-0518
LA, Monroe                            318                                          387-6330
LA, New Orleans                    504                                          524-4094
LA, Shreveport                       318                                          221-5833
ME, Augusta                           207                                          622-3123
ME, Brewer                            207                                          989-3081
ME, Lewiston             207                                          784-0105
ME, Portland              207                                          761-4000
MD, Annapolis                       301                                          224-8550
MD, Baltimore                        301                                          727-6060
MD, Frederick                        301                                          293-9596
MA, Boston                            617                                          292-0662
MA, Brockton             508                                          580-0721
MA, Fall River                        508                                          677-4477
MA, Framingham                    508                                          879-6798
MA, Lawrence                        508                                          975-2273
MA, Lexington                       617                                          863-1550
MA, Lowell                            508                                          937-5214
MA, New Bedford                 508                                          999-2915
MA, Northampton                  413                                          586-0510
MA, Pittsfield             413                                          499-7741
MA, Salem                              508                                          744-1559
MA, Springfield                      413                                          781-3811
MA, Woods Hole                   508                                          540-7500
MA, Worcester                       508                                          755-4740
MI, Ann Arbor                        313                                          996-5995
MI, Battle Creek                     616                                          968-0929
MI, Detroit                              313                                          964-2988
MI, Flint                                  313                                          235-8517
MI, Grand Rapids                   616                                          774-0966 
MI, Jackson                             517                                          782-8111                                
MI, Kalamazoo                       616                                          345-3088
MI, Lansing                            517                                          484-0062
MI, Midland                           517                                          832-7068
MI, Muskegon                        616                                          726-5723
MI, Pontiac                             313                                          332-5120
MI, Port Huron                       313                                          982-8364
MI, Saginaw                           517                                          790-5166
MI, Southfield                        313                                          827-4710
MI, Traverse City                    616                                          946-2121
MI, Warren                             313                                          575-9152
MN, Duluth                            218                                          722-1719
MN, Mankato                         517                                          388-3780
MN, Minneapolis                    612                                          341-2459
MN, Rochester                        507                                          282-5917
MN, St. Cloud                        612                                          253-2064
MS, Gulfport              601                                          863-0024
MS, Jackson                            601                                          969-0036
MS, Meridian              601                                          482-2210
MS, Starkville             601                                          324-2155
MO, Columbia                        314                                          449-4404
MO, Jefferson City     314                                          634-5178
MO, Kansas City                    816                                          221-9900
MO, St. Joseph                       816                                          279-4797
MO, St. Louis             314                                          421-4990
MO, Springfield                      417                                          864-4814
MT, Billings                406                                          245-7649
MT, Great Falls                       406                                          771-0067
MT, Helena                             406                                          443-0000
MT, Missoula              406                                          721-5900
NE, Lincoln                            402                                          475-4964
NE, Omaha                             402                                          341-7733
NV, Las Vegas                       702                                          737-6861
NV, Reno                                702                                          827-6900
NH, Concord                          603                                          224-1024
NH, Durham                           603                                          868-2924
NH, Manchester                      603                                          627-8725
NH, Nashua                            603                                          880-6241
NH, Portsmouth                      603                                          431-2302
NJ, Atlantic City                     609                                          348-0561
NJ, Freehold               201                                          780-5030
NJ, Hackensack                      201                                          488-6567
NJ, Marlton                             609                                          596-1500
NJ, Merchantville                    609                                          663-9297
NJ, Morristown                       201                                          455-0275
NJ, New Brunswick                201                                          745-2900
NJ, Newark                             201                                          623-0469
NJ, Passaic                              201                                          778-5600
NJ, Paterson                201                                          684-7560
NJ, Princeton              609                                          799-5587
NJ, Rahway                            201                                          815-1885
NJ, Redbank                           201                                          571-0003
NJ, Roseland               201                                          227-5277
NJ, Sayreville              201                                          525-9507
NJ, Trenton                             609                                          989-8847
NM, Albuquerque                   505                                          243-4479
NM, Las Cruces                      505                                          526-9191
NM, Santa Fe              505                                          473-3403
NY, Albany                            518                                          465-8444
NY, Binghampton                  607                                          772-6642
NY, Buffalo                            716                                          847-1440
NY, Dear Park                        516                                          667-5566
NY, Hempstead                      516                                          292-3800
NY, Ithaca                              607                                          277-2142
NY, New York City               212                                          741-8100
NY, New York City               212                                          620-6000
NY, Plattsburgh                      518                                          562-1890
NY, Poughkeepsie                  914                                          473-2240
NY, Rochester                        716                                          454-1020
NY, Syracuse              315                                          472-5583
NY, Utica                               315                                          797-0920
NY, Whit Plains                      914                                          328-9199
NC, Asheville             704                                          252-9134
NC, Charlotte             704                                          332-3131
NC, Fayetteville                      919                                          323-8165
NC, Gastonia              704                                          865-4708
NC, Greensboro                      919                                          273-2851
NC, High Point                       919                                          889-7494
NC, North Wilkesboro            919                                          838-9034
NC, Raleigh                            919                                          834-8254
NC, Res Tri Park                     919                                          549-8139
NC, Tarboro                            919                                          823-0579
NC, Wilmington                     919                                          763-8313
NC, Winston-Salem                919                                    725-2126
ND, Fargo                               701                                          235-7717
ND, Grand Forks                    701                                          775-7813
ND, Mandan                           701                                          663-2256
OH, Canton                            216                                          452-0903
OH, Cincinnati                        513                                          579-0390
OH, Cleveland                        216                                          575-1658
OH, Colombus                        614                                          463-9340
OH, Dayton                            513                                          461-5254
OH, Elyria                               216                                          323-5059
OH, Hamilton             513                                          863-4116
OH, Kent                                216                                          678-5115
OH, Lorain                              216                                          960-1170
OH, Mansfield                        419                                          526-0686
OH, Sandusky                        419                                          627-0050
OH, Springfield                      513                                          324-1520
OH, Toledo                             419                                          255-7881
OH, Warren                            216                                          394-0041
OH, Wooster                           216                                          264-8920
OH, Youngstown                   216                                          743-1296
OK, Bartlesville                      918                                          336-3675
OK, Lawton                            405                                          353-0333
OK, Oklahoma City                405                                          232-4546
OK, Stillwater             405                                          624-1113
OK, Tulsa                                918                                          584-3247
OR, Corvallis              503                                          754-9273
OR, Eugena                            503                                          683-1460
OR, Hood River                     503                                          386-4405
OR, Klamath Falls                  503                                          882-6282
OR, Medford                          503                                          779-6343
OR, Portland               503                                          295-3028
OR, Salem                               503                                          378-7712
PA, Allentown                        215                                          435-3330
PA, Altoona                            814                                          949-0310
PA, Carlisle                 717                                          249-9311
PA, Danville               717                                          271-0102
PA, Erie                                  814                                          899-2241
PA, Harrisburg                        717                                          236-6882
PA, Johnstown                        814                                          535-7576
PA, King Of Prussia   215                                          337-4300
PA, Lancaster             717                                          295-5405
PA, Philadelphia                     215                                          574-9462
PA, Pittsburgh                        412                                          288-9950
PA, Reading                           215                                          376-8750
PA, Scranton               717                                          961-5321
PA, State College                   814                                          231-1510
PA, Wilkes-Barre                    717                                          829-3108
PA, Williamsport                    717                                          494-1796
PA, York                                 717                                          846-6550
RI, Providence                        401                                          751-7910
SC, Charleston                        803                                          722-4303
SC, Columbia              803                                          254-0695
SC, Greenville             803                                          233-3486
SC, Spartenburg                      803                                          585-1637
SC, Pierre                                605                                          224-0481
SC, Rapid City                       605                                          348-2621
SC, Sioux Falls                       605                                          336-8593
TN, Bristol                              615                                          968-1130
TN, Chattanooga                    615                                          756-1161
TN, Clarksville                        615                                          552-0032
TN, Johnson City                    615                                          282-6645
TN, Knoxville             615                                          525-5500
TN, Memphis                          901                                          521-0215
TN, Nashville              615                                          244-3702
TN, Oak Ridge                       615                                          481-3590
TX, Abilene                            915                                          676-9151
TX, Amarillo               806                                          373-0458
TX, Athens                             214                                          677-1712
TX, Austin                              512                                          928-1130
TX, Brownsville                      512                                          542-0367
TX, Bryan                               409                                          822-0159
TX, Corpus Christi      512                                          884-9030
TX, Dallas                               214                                          748-6371
TX, El Paso                             915                                          532-7907
TX, Ft. Worth             817                                          332-4307
TX, Galveston             409                                          762-4382
TX, Houston                           713                                          227-1018
TX, Laredo                             512                                          724-1791
TX, Longview             214                                          236-4205
TX, Lubbock                           806                                          747-4121
TX, Mcallen                            512                                          686-5360
TX, Midland                           915                                          561-9811
TX, Nederland                        409                                          722-3720
TX, San Angelo                      915                                          944-7612
TX, San Antonio                     512                                          225-8004
TX, Sherman                           214                                          893-4995
TX, Temple                             817                                          773-9723
TX, Tyler                                 214                                          597-8925
TX, Waco                                817                                          752-9743
TX, Wichita Falls                    817                                          322-3774
UT, Ogden                              801                                          627-1630
UT, Provo                               801                                          373-0542
UT, Salt Lake City      801                                          359-0149
VT, Burlington                        802                                          864-0808
VT, Montpelier                       802                                          229-4966
VT, Rutland                            802                                          775-1676
VT, White River Jct.   802                                    295-7631
VA, Blacksburg                      703                                    552-9181
VA, Charlottesville     804                                    977-5330
VA, Covington                       703                                    962-2217
VA, Fredericksburg    703                                    371-0188
VA, Harrisonburg                   703                                          434-7121
VA, Herndon                          703                                          435-1800
VA, Lynchburg                       804                                          845-0010
VA, Newport News                804                                          596-6600
VA, Norfolk                           804                                          625-1186
VA, Richmond                       804                                          788-9902
VA, Roanoke                          703                                          344-2036
WA, Auburn                           206                                          939-9982
WA, Bellingham                     206                                          733-2720
WA, Everett                            206                                          775-9929
WA, Longview                       206                                          577-5835
WA, Olympia                          206                                          754-0460
WA, Richland             509                                          943-0649
WA, Seattle                            206                                          625-9612
WA, Spokane                          509                                          455-4071
WA, Tacoma                           206                                          627-1791
WA, Vancouver                      206                                          693-6914
WA, Wenatchee                      509                                          663-6227
WA, Yakima                           509                                          575-1060
WV, Charleston                      304                                          343-6471
WV, Huntington                     304                                          523-2802
WV, Morgantown                   304                                          292-0104
WV, Wheeling                        304                                          233-7732
WI, Beloit                               608                                          362-5287
WI, Eau Claire                        715                              836-9295
WI, Green Bay                        414                              432-2815
WI, Kenosha                           414                                    552-9242
WI, La Crosse             608                                    784-0560
WI, Madison                           608                                    257-5010
WI, Milwaukee                       414                                          271-3914
WI, Neenah                             414                                          722-7636
WI, Racine                              414                                          632-6166
WI, Sheboygan                       414                                          452-3995
WI, Wausau                            715                                          845-9584
WI, West Bend                       414                                          334-2206
WY, Casper                            307                                          265-5167
WY, Cheyenne                       307                                          638-4421
WY, Laramie                          307                                          721-5878                                                                                                                                                                                                                                
H. Telenet DNIC's
           
           
            Here is the list of all the Telenet DNIC's. These
will be defined and explained in the next section:

DNIC:                                     NETWORK:                          

02041                                      Datanet-1
02062                                      DCS
02080                                      Transpac
02284                                      Telepac (Switzerland)
02322                                      Datex-P (Austria)
02392                                      Radaus
02342                                      PSS
02382                                      Datapak (Denmark)
02402                                      Datapak (Sweden)
02405                                      Telepak
02442                                      Finpak
02624                                      Datex-P (West Germany)
02704                                      Luxpac
02724                                      Eirpak
03020                                      Datapac
03028                                      Infogram
03103                                      ITT/UDTS (U.S.A.)
03106                                      Tymnet
03110                                      Telenet
03340                                      Telepac (Mexico)
03400                                      UDTS (Curacau)
04251                                      Isranet
04401                                      DDX-P
04408                                      Venus-P
04501                                      Dacom-Net
04542                                      Intelpak
05052                                      Austpac
05053                                      Midas
05252                                      Telepac (Hong Kong)
05301                                      Pacnet
06550                                      Saponet
07240                                      Interdata
07241                                      Renpac
07421                                      Dompac
09000                                      Dialnet


I. Telenet NUA's


            Here is a list of a few Telenet NUA's and what type of system
they are. But first, this is how an NUA is put together:

                                    031106170023700
                  \   /\ /  \ /
                                      |   |    |
                  DNIC Area  NUA
                       Code 

            The DNIC says which network connected to Telenet you are using.
The area code is the area code for the area that the NUA is in.  And
the NUA is the address of the computer on Telenet.  Please note that
an NUA does NOT have to be in your area code for you to connect to it.
            There are two ways of finding useful NUA's.  The first way is to
get or write an NUA scanning program.  The second way is to get a copy
of the Legion Of Doom's Telenet Directory.( Volume 4 of the LOD
Technical Journals)
            Now, here is the list. Remember that these are only a few NUA's.
These are NOT all of the Telenet NUA's.  All of these NUA's DO accept
reverse charging.  Also, please note that all of these may not be
working by the time you read this and that network congestion
frequently makes an NUA inaccessible for a short period of time.

NUA:                                                                          SYSTEM TYPE:

031102010022500                                                      VAX
031102010015600                                                      UNIX
031102010022000                                                      VAX
031102010025900                                                      UNIX
031102010046100                                                      VAX
031102010025200                                                      PRIME
031102010046100                                                      VAX
031102010052200                                                      VAX
031102020001000                                                      PRIME
031102020013200                                                      VAX
031102020014100                                                      PRIME
031102020014200                                                      PRIME
031102020015000                                                      VAX
031102020016100                                                      UNIX
031102020021400                                                      PRIME
031102020024500                                                      AOS
031102020030800                                                      PRIME
031102020030900                                                      PRIME
031102020031200                                                      PRIME
031102020033600                                                      VAX
031102020033700                                                      VAX
031102020034300                                                      PRIME
031102020036000                                                      HP-3000
031102030007500                                                      VAX
031102030002200                                                      VM/370
031102030013600                                                      PRIME
031102060003200                                                      HP-3000
031102060044000                                                      VAX
031102060044900                                                      NOS
031102060044700                                                      VM/370
031102120003900                                                      NOS
031102120015200                                                      PRIME
031102120026600                                                      VAX
031102120026300                                                      VAX
031102120026700                                                      UNIX
031102120044900                                                      UNIX
031102120053900                                                      VOS
031102140024000                                                      VAX


J. Basic UNIX hacking

            UNIX is probably the most commonly used operating system on Telenet, and is the easiest to hack since it doesn't record bad login attempts.  You know you've found a UNIX system when it gives you a "Login" prompt, and then a "Password" prompt. To get in you should first try the default logins.(Listed below.) If these don't work try some of the passwords listed in Section M. If these don't work try to find backdoors. These are passwords that may have been put in to allow the programmer (or someone else who could be in a position to make a backdoor) to get access into the system. These are usually not known about by anyone but the individual who made it. Try doing some research on the programmer and other people who helped to make the system. And, if these don't work, just try guessing them. The Login (usually the account holders name) has 1-8 characters and the Password is 6-8 characters. Both can be either letters or numbers, or a combination of the two.
            Once you get in, you should get a "$" prompt, or some other special character like it. You should only use lower case letters when hacking UNIX, this seems to be standard format. If you type "man [command]" at the prompt, it should list all of the commands for that system. Anyway, here are the default Logins and Passwords:


Login:                                      Password:

root                                                      root
root                                                      system
sys                                                       sys
sys                                                       system
daemon                                               daemon
uucp                                                    uucp
tty                                                        tty
test                                                      test
unix                                                     unix
unix                                                     test
bin                                                       bin
adm                                                     adm
adm                                                     admin
admin                                                  adm
admin                                                  admin
sysman                                                sysman
sysman                                                sys
sysman                                                system
sysadmin                                             sysadmin
sysadmin                                             sys
sysadmin                                             system
sysadmin                                             admin
sysadmin                                             adm
who                                                     who
learn                                                    learn
uuhost                                     uuhost
guest                                                    guest
host                                                     host
nuucp                                                  nuucp
rje                                                        rje
games                                                  games
games                                                  player
sysop                                                   sysop
root                                                      sysop
demo                                                   demo


            Once you are in, the first thing that you need to do is save the password file to your hard drive or to a disk. The password file contains the Logins and Passwords. The passwords are encoded. To get the UNIX password file, depending on what type of UNIX you are in, you can type one of the following things:

/etc/passwd
or
cat /etc/passwd 

            The first one is the standard command, but there are other commands as well, like the second one. Once you get the password file, it should look like this:


john:234abc56:9999:13:John Johnson:/home/dir/john:/bin/john

           
            Broken down, this is what the above password file states:


Username: john
Encrypted Password: 234abc56
User Number: 9999
Group Number: 13
Other Information: John Johnson
Home Directory: /home/dir/john
Shell: /bin/john


            If the password file does not show up under one of the above two commands, then it is probably shadowed.
            The following definition of password shadowing was taken from the alt.2600 hack faq:
            "Password shadowing is a security system where the encrypted password field is replaced with a special token and the encrypted password is stored in a seperate file which is not readable by normal system users."
            If the password file is shadowed, you can find it in one of the following places, depending on the type of UNIX you are using:


UNIX System Type:               Path:                                                                Token:

AIX 3                                      /etc/security/passwd                               !
or                                             /tcb/auth/files/<first letter of      #      
                                                username>/<username>

A/UX 3.Os                              /tcb/files/auth/*

BSD4.3-Reno                         /etc/master.passwd                                 *

ConvexOS 10                         /etc/shadpw                                                        *

Convex0S 11                          /etc/shadow                                                        *

DG/UX                                               /etc/tcb/aa/user                                                   *

EP/IX                                      /etc/shadow                                                        x

HP-UX                                                /.secure/etc/passwd                                *

IRIX 5                                    /etc/shadow                                                        x

Linux 1.1                                 /etc/shadow                                                        *

OSF/1                                      /etc/passwd[.dir|.pag]                             *

SCO UNIX #.2.x                    /tcb/auth/files/<first letter of      *
                                                username>/<username>

SunOS 4.1+c2             /etc/security/passwd.adjunct                  ##

SunOS 5.0                               /etc/shadow                                                       

System V 4.0              /etc/shadow                                                        x

System V 4.2              /etc/security/* database                         

Ultrix 4                                    /etc/auth[.dir|.pag]                                  *

UNICOS                                /etc/udb                                                              *


            Some passwords can only be used for a certain amount of time without having to be changed, this is called password aging. In the password file example below, the "C.a4" is the password aging data:


bob:123456,C.a4:6348:45:Bob Wilson:/home/dir/bob:/bin/bob


            The characters in the password aging data stand for the following:


1. Maximum number of weeks a password can be used without changing.
2. Minimum number of weeks a password must be used before being changed.
3&4. Last time password was changed, in number of weeks since 1970.


            The password aging data can be decoded using the chart below:

Character:                                Number:

.                                               0
/                                               1
0                                              2
1                                              3
2                                              4
3                                              5
4                                              6
5                                              7
6                                              8
7                                              9
8                                              10
9                                              11
A                                             12
B                                             13
C                                             14
D                                             15       
E                                              16
F                                              17
G                                             18
H                                             19       
I                                               20
J                                               21
K                                             22
L                                              23
M                                             24
N                                             25
O                                             26
P                                              27
Q                                             28
R                                             29
S                                              30
T                                              31
U                                             32
V                                             33
W                                            34
X                                             35
Y                                             36
Z                                              37
a                                              38
b                                              39
c                                              40
d                                              41
e                                              42
f                                               43
g                                              44
h                                              45
i                                               46
j                                               47
k                                              48
l                                               49
m                                             50
n                                              51
o                                              52
p                                              53
q                                              54
r                                               55
s                                               56
t                                               57
u                                              58
v                                              59
w                                             60
x                                              61
y                                              62
z                                              63


            Now, explore the system freely, be careful, and have fun!


K. Basic VAX/VMS hacking


            The VAX system runs the VMS (Virtual Memory System) operating system. You know that you have a VAX system when you get a "username" prompt. Type in capital letters, this seems to be standard on VAX's. Type "HELP" and it gives you all of the help that you could possibly want. Here are the default usernames and passwords for VAX's:

Username:                                           Password:

SYSTEM                                            OPERATOR
SYSTEM                                            MANAGER
SYSTEM                                            SYSTEM
SYSTEM                                            SYSLIB
OPERATOR                                       OPERATOR
SYSTEST                                           UETP
SYSTEST                                           SYSTEST
SYSTEST                                           TEST
SYSMAINT                                       SYSMAINT
SYSMAINT                                       SERVICE
SYSMAINT                                       DIGITAL
FIELD                                                            FIELD
FIELD                                                            SERVICE
GUEST                                                           GUEST
GUEST                                                           unpassworded
DEMO                                                            DEMO
DEMO                                                            unpassworded
TEST                                                   TEST
DECNET                                            DECNET


           
            Here are some of the VAX/VMS commands:


Command:                                          Function:

HELP (H)                                           Gives help and list of commands.
TYPE (T)                                            View contents of a file.
RENAME (REN)                               Change name of a file.
PURGE (PU)                                     Deletes old versions of a file.
PRINT (PR)                                        Prints a file.
DIRECTORY (DIR)                          Shows list of files.
DIFFERENCES         (DIF)                           Shows differences between files.
CREATE (CR)                                               Creates a file.
DELETE (DEL)                                 Deletes a file.
COPY (COP)                                      Copy a file to another.
CONTINUE (C)                                 Continues session.


           
            The password file on VAX's are available when you type in the command:

SYS$SYSTEM:SYSUAF.DAT

            The password file on most VAX's are usually not available to normal system users, but try it anyway. If the default logins don't work, use the same means of finding one as stated in Section J.
            Be VERY careful when hacking VAX's becuase they record every bad login attempt. They are sometimes considered one of the most secure systems. Because of this, I advise not to try hacking these until you are more advanced.
            But, when you are an advanced hacker, or if you are already an advanced hacker, I advise that you try a few passwords at a time and then wait and try a few more the next day and so on, because when the real user logs on it displays all of the bad login attempts.


L. Basic PRIME hacking


            PRIME computer systems greet you with "Primecon 18.23.05", or something like it, when you connect. You should type in capital letters on this system, too. Once you connect, it will usually just sit there. If this happens, type "LOGIN <USERNAME>". It should then ask you for your username and password. The default usernames and passwords are listed below:

Username:                               Password:

PRIME                                                PRIME
PRIME                                                PRIMOS
PRIMOS                                 PRIMOS
PRIMOS                                 PRIME
PRIMOS_CS                          PRIME
PRIMOS_CS                          PRIMOS
PRIMENET                            PRIMENET
SYSTEM                                SYSTEM
SYSTEM                                PRIME
SYSTEM                                PRIMOS
NETLINK                              NETLINK
TEST                                       TEST
GUEST                                               GUEST
GUEST1                                 GUEST


            When you are inside the system, type "NETLINK" and it ahould give you alot of help. This system uses NUA's, too. I might print these in the next volume.


M. Password List


            The password list was taken from A Novice's Guide To Hacking, by The Legion Of Doom, and from some of my own discoveries. Here is the list of commonly used passwords:

Password:

aaa
academia
ada
adrian
aerobics
airplane
albany
albatross
albert
alex
alexander
algebra
alias
alisa
alpha
alphabet
ama
amy
analog
anchor
andy
andrea
animal
answer
anything
arrow
arthur
ass
asshole
athena
atmosphere
bacchus
badass
bailey
banana
bandit
banks
bass
batman
beautiful
beauty
beaver
daniel
danny
dave
deb
debbie
deborah
december
desire
desperate
develop
diet
digital
discovery
disney
dog
drought
duncan
easy
eatme
edges
edwin
egghead
eileen
einstein
elephant
elizabeth
ellen
emerald
engine
engineer
enterprise
enzyme
euclid
evelyn
extension
fairway
felicia
fender
finite
format
god
hello
idiot
jester
john
johnny
joseph
joshua
judith
juggle
julia
kathleen
kermit
kernel
knight
lambda
larry
lazarus
lee
leroy
lewis
light
lisa
louis
love
lynne
mac
macintosh
mack
maggot
magic
malcolm
mark
markus
martin
marty
marvin
matt
master
maurice
maximum
merlin
mets
michael
michelle
mike
minimum
nicki
nicole
rascal
really
rebecca
remote
rick
reagan
robot
robotics
rolex
ronald
rose
rosebud
rosemary
roses
ruben
rules
ruth
sal
saxon
scheme
scott
secret
sensor
serenity
sex
shark
sharon
shit
shiva
shuttle
simon
simple
singer
single
singing
smile
smooch
smother
snatch
snoopy
soap
socrates
spit
spring
subway
success
summer
super
support
surfer
suzanne
tangerine
tape
target
taylor
telephone
temptation
tiger
tigger
toggle
tomato
toyota
trivial
unhappy
unicorn
unknown
urchin
utility
vicki
virgin
virginia
warren
water
weenie
whatnot
whitney
will
william
winston
willie
wizard
wonbat
yosemite
zap


N. Connecting modems to different phone lines       
                       

            Ok, if you are really paranoid (or smart) and you don't want to hack from your house for fear of getting caught, you can hook up your modem to other peoples phone lines or to payphones.
            If you want to hook your modem to a payphone, do it late at night and at a very secluded payphone. Look along either side of the phone. You should see a small metal tube (which contains the telephone wires) running along the wall. Somewhere along the tube it should widen out into a small box. Pop off the boxes lid and there is a nice little phone jack for ya'. Taking off the lid may be difficult because they are usually pretty secure, but nothing is impossible, so keep trying. Of course, you can only do this with a lap-top computer.
            Now, if you want to hook up the modem to someone's house or appartment phone line, you need to get a pair of red and green alligator clips, and an extra modem cord for your lap-top.
            After you get those parts, cut the plastic end off of your modem cord and you will see a red wire, a green wire, and two other wires, but you can ignore those. Attach the red alligator clip to the red wire, and attach the green alligator clip to the green wire and you're all set. Now all you need to do is go find a telephone pole or one of those small green boxes that stick out of the ground.(They should have a Bell Systems logo on them.)
            On a telephone pole open the little box that has a bunch of wires going to and from it. On the right side of the box you should see what look like two large screws.(These are called "terminals".) One should have a red wire wrapped around it and the other should have a green wire wrapped around it. Attach the red alligator clip the the red wire and the green alligator clip to the green wire, and you're all set. This should get you a dial tone. If it doesn't, make sure that the alligator clips are not touching each other, and that the alligator clips are attached to the exposed end of the wire.
            Now, on those green boxes you need to undo all of the screws and shit holding the lid on, and open it up. Then you should find basically the same setup as in the telephone pole. Attach the appropriate wires to the appropriate terminals and you are all set.
            This process can also be used to hook up a Beige Box (Lineman's Handset.) when phreaking.


O. Viruses, Trojans, and Worms


            Just in case some of you are interested, here are the definitions for Viruses, Trojans, and Worms.  These definitions were taken from the alt.2600 hack faq.

Trojan:

            "Remember the Trojan Horse? Bad guys hid inside it until they could get into the city to do their evil deed. A Trojan computer program is similiar. It is a program which does an unauthorized function, hidden inside an authorized program. It does something other than it claims to do, usually something malicious (although not necessarily!), and it is intended by the author to do whatever it does. If it is not intentional, it is called a bug or, in some cases, a feature :) Some Virus scanning programs detect some Trojans. Some scanning programs don't detect any Trojans. No Virus scanners detect all Trojans."

Virus:

            "A Virus is an independent program which reproduces itself. It may attach itself to other programs, it may create copies of itself (as in companion Viruses). It may damage or corrupt data, change data, or degrade the performance of your system by utilizing resources such as memory or disk space. Some Viruse scanners detect some Viruses. No Virus scanners detect all Viruses. No Virus scanner can protect against any and all Viruses, known and unknown, now and forevermore."

Worm:

            "Made famous by Robert Morris, Jr., Worms are programs which reproduce by copying themselves over and over, system to system, using up resources and sometimes slowing down the system. They are self contained and use the networks to spread, in much the same way that Viruses use files to spread. Some people say the solution to Viruses and worms is to just not have any files or networks. They are probably correct. We could include computers."


II. PHREAKING


A. What is phreaking

           
            Phreaking is basically hacking with a telephone. Using different "boxes" and "tricks" to manipulate the phone companies and their phones, you gain many things, two of which are: knowledge about telephones and how they work, and free local and long distance phone calls. In the following sections, you will learn some about boxes, what they are, and how they work. You will also learn about the other forms of phreaking.


B. Why phreak?


            Phreaking, like hacking, is used to gather information about telephones, telephone companies, and how they work. There are other benefits as well. As stated above, you also get free phone calls. But, these are used mainly to gather more information about the phones, and to allow us free access to all information.


C. Phreaking rules



            Most of the same rules apply for hacking and phreaking, so I will only list a few here.


1.         Never box over your home phone line.
2.         You should never talk about phreaking projects over your home phone line.
3.         Never use your real name when phreaking.
4.         Be careful who you tell about your phreaking projects.
5.         Never leave phreaking materials out in the open. Keep them in a safe place.
6.         Don't get caught.


D. Where and how to start phreaking


            Well, you can phreak on any telephone, but as stated above, it is very stupid to do so on your home phone line.
            First you need you need to construct the boxes needed for what you want to do. All of the boxes and their descriptions are listed in the next section. Most of the boxes are very easy to make, but if your not into making shit, there are usually alternative ways of making them.


E. Boxes and what they do


Box:                                                    Description:

Red Box                                              generates tones for free phone calls

Black Box                                           when called, caller pays nothing

Beige Box                                           lineman's handset

Green Box                                           generates coin return tones

Cheese Box                                         turns your phone into a payphone

Acrylic Box                                         steal 3-way calling and other services

Aqua Box                                            stops F.B.I. lock-in-trace

Blast Box                                            phone microphone amplifier

Blotto Box                                          shorts out all phones in your area

Blue Box                                             generates 2600hz tone

Brown Box                                         creates party line

Bud Box                                             tap neighbors phone

Chatreuse Box                                    use electricity from                                                     phone

Chrome Box                                        manipulates traffic                                                      signals

Clear Box                                            free calls

Color Box                                           phone conversation                                                     recorder

Copper Box                                         causes crosstalk                                                           interference

Crimson Box                                       hold button

Dark Box                                            re-route calls

Dayglo Box                                         connect to neighbors phone line

Divertor Box                           re-route calls

DLOC Box                                         create party line

Gold Box                                            dialout router

Infinity Box                            remote activated phone                                                           tap

Jack Box                                             touch-tone key pad

Light Box                                            in-use light

Lunch Box                                          AM transmitter

Magenta Box                                      connect remote phone line to                                                  another

Mauve Box                                         phone tap without cutting into                                                           the line

Neon Box                                            external microphone

Noise Box                                           creates line noise

Olive Box                                            external ringer

Party Box                                            creates party line

Pearl Box                                            tone generator

Pink Box                                             creates party line

Purple Box                                          hold button

Rainbow Box                                      kill trace

Razz Box                                            tap neighbors phone

Rock Box                                            add music to phone line

Scarlet Box                                         causes interference

Silver Box                                           create DTMF tones for A,B,C, and                                                    D

Static Box                                           raises voltage on phone                                                           line

Switch Box                                         add services

Tan Box                                              phone conversation                                                     recorder

TV Cable Box                         see sound waves on TV

Urine Box                                           create disturbance on phone                                                   headset

Violet Box                                          stop payphone from hanging                                                  up

White Box                                           DTMF key pad

Yellow Box                                         add line extension


F. Box Plans


            The Red Box is the main tool that you will use so I have included the Red Box plans. The other box plans can be downloaded from the Internet.

Red Box:

            There are two ways that you can make a Red Box:

            One is to go to Radio Shack and buy a tone dialer and a 6.5536Mhz crystal.(If Radio Shack doesn't have the crystal, you can order them from the electronics companies that I have listed at the end of this section.) Open up the tone dialer and replace the existing crystal (big, shiny, metal thing labeled "3.579545Mhz") with the 6.5536Mhz crystal. Now, close it up. You have a red box.
            To use it for long distance calls play the tones that add up to the amount of money that the operator requests. For a 25 cents tone press 5 *'s. For a 10 cents tone press 3 *'s. For a 5 cents tone press 1 *.
            And, the second way, which is a much easier method, is to get the Red Box tones from a phreaking program, such as: Omnibox, or Fear's Phreaker Tools. Play the tones as you hold a microcassette recorder about 1-inch away from your computer speakers, and record the tones.
            The Red Box only works on public telephones, it does not work on COCOT's.(Defined in next section.) It makes the telephone think that you have put money in. Red Boxes do not work on local calls because the phone is not using ACTS (Automated Coin Toll System), unless you call the operator and have her place the call for you. You tell her the number that you want to dial and then when she asks you to put in your money, play the tones. If she asks you why you need her to place the call tell her that one of the buttons is smashed in or something like that. You now have and know how to use a Red Box!

Electronics Companies:

Alltronics
2300 Zanker Road
San Jose, CA 95131
(408)943-9774  -Voice-
(408)943-9776  -Fax-

Blue Saguaro
P.O. Box 37061
Tucson, AZ 85740

Mouser
(800)346-6873

Unicorn Electronics
10000 Canoga Ave. Unit C-2
Chatsworth, CA 91311
1-800-824-3432


G. Free calling from COCOT's


            First of all, COCOT stands for "Customer Owned Customer Operated Telephone". These are most likely to be found at resteraunts, amusement parks, etc.
            All you have to do to make a free call from a COCOT is dial a 1-800 number (they let you do this for free), say some bullshit and get them to hang up on you. Stay on the line after they hang up, then dial the number that you want to call.
            This may not work by the time you read this because COCOT owners are becoming more aware of us every day.


H. ANAC numbers


            ANAC stands for "Automated Number Announcment Circuit". In other words, you call the ANAC number in your area and it tells you the number that you are calling from. This is useful when Beige Boxing, or hooking your modem up to other phone lines, to find out what number you are using. The "?" are substituted for unknown numbers. Do some scanning to find them out. Here are the ANAC numbers for the U.S.A. with their area code, and the only one I knew of in the U.K.:

U.S.A.:

Area Code:                                          ANAC Number:

201                                                      958
202                                                      811
203                                                      970
205                                                      300-222-2222
205                                                      300-555-5555
205                                                      300-648-1111
205                                                      300-765-4321
205                                                      300-798-1111
205                                                      300-833-3333
205                                                      557-2311
205                                                      811
205                                                      841-1111
205                                                      908-222-2222
206                                                      411
207                                                      958
209                                                      830-2121
209                                                      211-9779
210                                                      830
212                                                      958
213                                                      114
213                                                      1223
213                                                      211-2345
213                                                      211-2346
213                                                      760-2???
213                                                      61056
214                                                      570
214                                                      790
214                                                      970-222-2222
214                                                      970-611-1111
215                                                      410-????
215                                                      511
215                                                      958
216                                                      200-????
216                                                      331
216                                                      959-9968
217                                                      200-???-????
219                                                      550
219                                                      559
301                                                      958-9968
310                                                      114
310                                                      1223
310                                                      211-2345
310                                                      211-2346
312                                                      200
312                                                      290
312                                                      1-200-8825
312                                                      1-200-555-1212
313                                                      200-200-2002
313                                                      200-222-2222                                                 
313                                                      200-???-????
313                                                      200200200200200
314                                                      410-????
315                                                      953
315                                                      958
315                                                      998
317                                                      310-222-2222
317                                                      559-222-2222
317                                                      743-1218
334                                                      5572411
334                                                      5572311
401                                                      200-200-4444
401                                                      222-2222
402                                                      311
404                                                      311
404                                                      940-???-????
404                                                      940
405                                                      890-7777777                                                  
405                                                      897
407                                                      200-222-2222
408                                                      300-???-????
408                                                      760
408                                                      940
409                                                      951
409                                                      970-????
410                                                      200-6969
410                                                      200-555-1212
410                                                      811
412                                                      711-6633
412                                                      711-4411
412                                                      999-????
413                                                      958
413                                                      200-555-5555
414                                                      330-2234
415                                                      200-555-1212
415                                                      211-2111
415                                                      2222
415                                                      640
415                                                      760-2878
415                                                      7600-2222
419                                                      311
502                                                      200-2222222
502                                                      997-555-1212
503                                                      611
503                                                      999
504                                                      99882233
504                                                      201-269-1111
504                                                      998
504                                                      99851-0000000000
508                                                      958
508                                                      200-222-1234
508                                                      200-222-2222
508                                                      26011
509                                                      560
510                                                      760-1111
512                                                      830
512                                                      970-????
515                                                      5463
515                                                      811
516                                                      958
516                                                      968
517                                                      200-222-2222
517                                                      200200200200200
518                                                      511
518                                                      997
518                                                      998
603                                                      200-222-2222                                                 
606                                                      997-555-1212
606                                                      711
607                                                      993
609                                                      958
610                                                      958
610                                                      958-4100
612                                                      511
614                                                      200
614                                                      517
615                                                      200200200200200
615                                                      2002222222
615                                                      830
616                                                      200-222-2222
617                                                      200-222-1234
617                                                      200-222-2222
617                                                      200-444-4444
617                                                      220-2622
617                                                      958
618                                                      200-???-????
618                                                      930
619                                                      211-2001
619                                                      211-2121
703                                                      811
704                                                      311
707                                                      211-2222
708                                                      1-200-555-1212
708                                                      1-200-8825
708                                                      200-6153
708                                                      724-9951
708                                                      356-9646
713                                                      380
713                                                      970-????
713                                                      811
714                                                      114
714                                                      211-2121
714                                                      211-2222
716                                                      511
716                                                      990
717                                                      958
718                                                      958
802                                                      2-222-222-2222
802                                                      200-222-2222
802                                                      1-700-222-2222
802                                                      111-2222
805                                                      114
805                                                      211-2345
805                                                      211-2346
805                                                      830
806                                                      970-????
810                                                      200200200200200
812                                                      410-555-1212
813                                                      311
815                                                      200-???-????
817                                                      290
817                                                      211
818                                                      970-611-1111
818                                                      1223
818                                                      211-2345
903                                                      211-2346
904                                                      970-611-1111
906                                                      200-222-222
907                                                      1-200-222-2222
907                                                      811
908                                                      958
910                                                      200
910                                                      311
910                                                      988
914                                                      990-1111
915                                                      970-????
916                                                      211-2222
916                                                      461
919                                                      200
919                                                      711

U.K.:

175


III. REFERENCE


A. Hacking and phreaking WWW. sites
   

            Here is a list of some World Wide Web sites that contain hacking, phreaking, computer, virus, carding, security, etc. material:

Site Address:

http://www.outerlimits.net/lordsome/index.html (Hacker's Layer)
http://web2.airmail.net/km/hfiles/free.htm     (Hacker's Hideout)
http://resudox.net/bio/novell.html
http://www.louisville.edu/wrbake01/hack2.html
http://www.intersurf.com/~materva/files.html
http://hightop.nrl.navy.mil/rainbow.html
http://www.rit.edu/~jmb8902/hacking.html
http://www.spatz.com/pecos/index.html
http://pages.prodigy.com/FL/dtgz94a/files2.html
http://www.2600.com                                                 (alt.2600)
http://att.net/dir800
http://draco.centerline.com:8080/~franl/crypto.html
http://everest.cs.ucdavis.edu/Security.html
http://ice-www.larc.nasa.gov/WWW/security.html
http://lOpht.com                                                                      (lOpht)
http://lOpht.com/~oblivion/IIRG.html
http://underground.org
http://www.alw.nih.gov/WWW/security.html
http://www.aspentec.com/~frzmtdb/fun/hacker.html
http://www.cis.ohi-state.edu/hypertext/faq/usenet/alt-2600-faq/faq.html
http://www.cs.tufts.ed/~mcable/cypher/alerts/alerts.html
http://www.engin.umich.edu/~jgotts/underground/boxes.html
http://www.etext.org/Zines
http://www.inderect.com/www/johnk/
http://www.mgmua.com/hackers/index.html
http://www.paranoia.com/mthreat
http://www.paranoia.com/astrostar/fringe.html
http://www.umcc.umich.edu/~doug/virus-faq.html
http://www.wired.com


B. Good hacking and phreaking text files


            All of these files are available by download from the Internet.


File Name:


A Novice's Guide To Hacking

Alt.2600 Hack Faq

The Hacker's Handbook

The Official Phreaker's Manual

Rainbow Books (Listed in Section D.)

The Hacker Crackdown

Computer Hackers: Rebels With A Cause

The Legion Of Doom Technical Journals

The Ultimate Beginner's Guide To Hacking And Phreaking (Of course!)


C. Hacking and phreaking Newsgroups


alt.2600
alt.2600.hope.tech
alt.cellular
alt.cellular-phone-tech
alt.comp.virus
alt.cracks
alt.cyberpunk
alt.cyberspace
alt.dcom.telecom
alt.fan.lewiz
alt.hackers
alt.hackintosh
alt.hackers.malicious
alt.security


D. Rainbow Books


            The Rainbow Books are a series of government evaluations on various things related to computer system security. You can get all of the existing Rainbow Books free and if you ask to be put on their mailing list you will get each new one as it comes out. Just write to the address or call the number below:

Infosec Awareness Division
ATTN: x711/IAOC
Fort George G. Meade, MD 20755-6000

or call:
(410)766-8729

           
            Here is the list of all the Rainbow Books and their descriptions:


Color:                                      Description:

Orange 1                                             D.O.D. Trusted Computer Systems

Green                                                  D.O.D. Password Management

Yellow                                                Computer Security Requirements

Yellow 2                                             Computer Security Requirements

Tan                                                      Understanding Audit In Trusted Systems

Bright Blue                                         Trusted Product Evaluation

Neon Orange                                       Understanding Discretionary Access

Teal Green                                           Glossary Of Computer Terms

Orange 2                                             Understanding Configurations

Red                                                     Interpretation Of Evaluation

Burgundy                                            Understanding Design Documentation

Dark Lavender                                    Understanding Trusted Distrobution

Venice Blue                                        Computer Security Sub-Systems

Aqua                                                   Understanding Security Modeling

Dark Red                                            Interpretations Of Environments

Pink                                                     Rating Maintenence Phase

Purple                                      Formal Verification Systems

Brown                                                 Understanding Trusted Facilities

Yellow-Green                         Writing Trusted Facility Manuals

Light Blue                                           Understanding Identification And                                                     Authentication In Trusted Systems

Blue                                                     Product Evaluation Questionaire

Gray                                                    Selecting Access Control List

Lavander                                             Data Base Management Interpretation

Yellow 3                                             Understanding Trusted Recovery

Bright Orange                         Understanding Security Testing

Purple 1                                               Guide To System Procurement

Purple 2                                               Guide To System Procurement

Purple 3                                               Guide To System Procurement

Purple 4                                               Guide To System Procurement

Green                                                  Understanding Data Remanence

Hot Peach                                           Writing Security Features

Turquiose                                            Understanding Information Security
                                               
Violet                                      Controlled Access Protection

Light Pink                                           Understanding Covert Channels


 Cool hacking and phreaking magazines


* Phrack Magazine

 * 2600 Magazine

 * Tap Magazine

Phantasy Magazine


Hacking and phreaking movies                                              


Movie:


Hackers

War Games

Hacking and phreaking Gopher sites


Address:

ba.com
csrc.ncsl.nist.gov
gopher.acm.org
gopher.cpsr.org
gopher.cs.uwm
gopher.eff.org
oss.net
spy.org
wiretap.spies.com


H. Hacking and phreaking Ftp sites


Address:

2600.com
agl.gatech.edu/pub
asylum.sf.ca.us
clark.net/pub/jcase
ftp.armory.com/pub/user/kmartind
ftp.armory.com/pub/user/swallow
ftp.fc.net/pub/defcon/BBEEP
ftp.fc.net/pub/phrack
ftp.giga.or.at/pub/hacker
ftp.lava.net/users/oracle
ftp.microserve.net/ppp-pop/strata/mac
ftp.near.net/security/archives/phrack
ftp.netcom.com/pub/br/bradelym
ftp.netcom.com/pub/daemon9
ftp.netcom.com/pub/zz/zzyzx
ftp.primenet.com/users/k/kludge